Browse Definitions :

Browse Definitions by Alphabet

CUR - CYB

  • Current Procedural Terminology (CPT) code - Current Procedural Terminology (CPT) codes are a uniform medical code set maintained and copyrighted by the American Medical Association and used to describe medical, surgical and diagnostic services.
  • cursor - A cursor is the position indicator on a computer display screen where a user can enter text.
  • CUSeeMe - CUseeMe is a low-cost product for Internet videoconferencing.
  • custom domain name suffix - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • custom factory integration - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
  • custom factory integration (CFI) - Custom factory integration (CFI) is an arrangement that a computer equipment vendor makes with a customer in which programs and files are pre-installed and the equipment is configured and tested at the factory prior to delivery.
  • custom TLD - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer - In agile software development, a customer is a person with an understanding of both the business needs and operational constraints for a project.
  • customer account record - A customer account record is the basic unit of information about a customer that resides in a CRM, or customer relationship management system.
  • customer acquisition cost - Customer acquisition cost is the fee associated with convincing a consumer to buy your product or service, including research, marketing and advertising costs.
  • customer analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer analytics (customer data analytics) - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer base - Customer base is the group of clients to whom a business markets and sells their goods or services.
  • customer churn (customer attrition) - Customer churn, also called customer attrition, is the number of paying customers who fail to become repeat customers.
  • customer communications management (CCM) - Customer communications management (CCM) is the administration of outbound communications to customers that includes the creation, delivery and storage of all types of communications.
  • customer data analytics - Customer analytics, also called customer data analytics, is the systematic examination of a company's customer information and customer behavior to identify, attract and retain the most profitable customers.
  • customer data integration - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data integration (CDI) - Customer data integration (CDI) is the process of defining, consolidating and managing customer information across an organization's business units and systems to achieve a "single version of the truth" for customer data.
  • customer data management (CDM) - Customer data management (CDM) is the centralization of customer information, such as customer experiences, demographics and feedback, into a single database.
  • customer data platform (CDP) - A customer data platform (CDP) is a type of software application that provides a unified platform of customer information that can be collected, viewed or accessed by other systems.
  • Customer Data Privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • customer demographics - Customer demographics are categories of consumer populations that are relevant to a business' purposes, such as marketing and product design.
  • customer edge router - A CE router (customer edge router) is a router located on the customer premises that provides an Ethernet interface between the customer's LAN and the provider's core network.
  • customer effort score (CES) - Customer effort score (CES) is a system for evaluating how much effort is required on the part of a customer to achieve satisfaction in their experience with a company.
  • customer engagement - Customer engagement is the means by which a company creates a relationship with its customer base to foster brand loyalty and awareness.
  • customer experience (CX) - Customer experience (CX) is the sum total of customers' perceptions and feelings resulting from interactions with a brand's products and services.
  • customer experience (CX) automation - Customer experience (CX) automation is any technology that assists customers with common tasks, sometimes replacing the involvement of humans, to improve customer interactions.
  • customer feedback loop - A feedback loop, in customer relationship management (CRM), is a strategy for gathering information about a buyer’s perception of a product or service in order to determine future actions.
  • customer health score - A customer health score is a value that indicates the long-term prospect for a customer to drop off or, conversely, to become a high-value, repeat customer through renewal or cross-selling or up-selling strategies.
  • Customer Information Control System - CICS (Customer Information Control System) is an online transaction processing (OLTP) program from IBM that, together with the COBOL programming language, has formed over the past several decades the most common set of tools for building customer transaction applications in the world of large enterprise mainframe computing.
  • customer intelligence - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • customer intelligence (CI) - Customer intelligence (CI) is information derived from customer data that an organization collects from both internal and external sources.
  • customer journey map - A customer journey map is a visual representation of the stages a customer goes through when interacting with a company.
  • customer lifecycle - In customer relationship management (CRM), customer lifecycle is a term used to describe the progression of steps a customer goes through when considering, purchasing, using and maintaining loyalty to a product or service.
  • customer lifetime value (CLV) - The customer lifetime value (CLV) is a metric that represents a customer's monetary worth to an organization.
  • customer loyalty - Customer loyalty is an adherence between a customer and a brand that causes the customer to make repeat purchases.
  • customer premises equipment - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
  • customer premises equipment (CPE) - Customer premises equipment (CPE) is telephone or other service provider equipment that is located on the customer's premises (physical location) rather than on the provider's premises or in between.
  • customer privacy - Consumer privacy, also known as customer privacy, involves the handling and protection of sensitive personal information that individuals provide in the course of everyday transactions.
  • customer profiling - Customer profiling is the practice of organizing customers into specific groups possessing similar goals or characteristics.
  • Customer Proprietary Network Information - In the United States, CPNI (Customer Proprietary Network Information) is information that telecommunications services such as local, long distance, and wireless telephone companies acquire about their subscribers.
  • customer relationship analysis (CRA) - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • customer retention - Customer retention is a metric that measures customer loyalty, or the ability for an organization to keep its customers over time.
  • customer satisfaction - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets the customer's expectations.
  • customer satisfaction (CSAT) - In customer relationship management, customer satisfaction (CSAT) is a measure of the degree to which a product or service meets customer expectations.
  • customer scoring models - A customer scoring model is a component of customer relationship management (CRM) programs that refers to various metrics used to help companies predict the long term financial value of customers.
  • customer segmentation - Customer segmentation is the practice of dividing a customer base into groups of individuals that are similar in specific ways relevant to marketing, such as age, gender, interests and spending habits.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer service charter - A customer service charter is a document that outlines how an organization promises to work with its customers along with providing insights into how an organization operates.
  • customer service chat (CSC) - In customer relationship management (CRM), customer service chat (CSC) is an Internet service that allows the user to communicate in real time with a customer service agent by using an instant messaging (IM) application that's built into the company's Web site.
  • customer success - Customer success is a strategy to assure that a company’s products are meeting the needs of the customer.
  • customer touch point - A customer touch point is any direct or indirect contact a customer has with a brand.
  • customer valuation - In customer relationship management (CRM), customer valuation is a scoring process used to help a company determine which customers the company should target in order to maximize profit.
  • customer-centric - Customer-centric is an approach to doing business that focuses on providing a positive customer experience both at the point of sale and after the sale in order to drive profit and gain competitive advantage.
  • customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • CUT - Coordinated Universal Time (abbreviated as UTC, and therefore often spelled out as Universal Time Coordinated and sometimes as Universal Coordinated Time) is the standard time common to every place in the world.
  • cut-and-paste attack - A cut-and-paste attack is an assault on the integrity of a security system in which the attacker substitutes a section of ciphertext (encrypted text) with a different section that looks like (but is not the same as) the one removed.
  • cutover migration - The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch.
  • cutting edge - Cutting edge is an adjective used to describe the newest, most advanced version of a product or service.
  • CVC - Calibrated Vectored Cooling (CVC) is an air-cooling technology developed by IBM for server systems with high component density.
  • CVE - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats.
  • CVO - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
  • CVO (chief visionary officer) - Chief Visionary Officer (CVO) is a new title being used in corporations to differentiate the holder from other corporate executives including the Chief Executive Officer (CEO), the Chief Financial Officer (CFO), the Chief Information Officer (CIO), and the Chief Technology Officer (CTO).
  • CVS - CVS also is an abbreviation for Computer Vision Syndrome.
  • CVSS (Common Vulnerability Scoring System) - The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in software.
  • CVV - Card verification value (CVV) is a combination of features used in credit, debit and automated teller machine (ATM) cards for the purpose of establishing the owner's identity and minimizing the risk of fraud.
  • CWDM - Coarse wavelength division multiplexing (CWDM) is a method of combining multiple signals on laser beams at various wavelengths for transmission along fiber optic cables, such that the number of channels is fewer than in dense wavelength division multiplexing (DWDM) but more than in standard wavelength division multiplexing (WDM).
  • CWE - Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software.
  • CWNP - Certified Wireless Networking Professional (CWNP)is the name for the family of wireless certifications from Planet3Wireless.
  • cXML - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • cyan magenta yellow key - CMYK is a scheme for combining primary pigments.
  • cyan, magenta, yellow, and black pigment model - CMYK is a scheme for combining primary pigments.
  • cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer and information age.
  • cyber attack - A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
  • cyber attribution - Cyber attribution is the process of tracking, identifying and laying blame on the perpetrator of a cyberattack or other hacking exploit.
  • cyber espionage - Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or government entity.
  • Cyber Intelligence Act - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Intelligence Sharing and Protection Act of 2011 - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Intelligence Sharing and Protection Act of 2011 (CISPA) - The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies.
  • Cyber Monday - Cyber Monday is a marketing event created to promote online sales.
  • cyber resilience - Cyber resilience is a concept that refers to the security that goes beyond defense and prevention to focus on response and resilience in moments of crisis.
  • Cyber Storm - Cyber Storm is the name of a simulated attack exercise conducted by the U.
  • cyber vigilantism - Cyber vigilantism is a rough approximation of law enforcement or an attempt at achieving justice or accomplishing something online through unauthorized channels.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • cybercafe - A cybercafe is a cafe, coffee or espresso shop, or similar food and/or beverage-serving place that has a number of personal computers connected to the Internet and available for use by customers.
  • cybercitizen - The term "cybercitizen" denotes a "citizen of the Internet" or a member of the "cybercommunity.
  • cybercommuting - Telecommuting and telework are synonyms for the use of telecommunication to work outside the traditional office or workplace, usually at home (SOHO) or in a mobile situation.
  • cybercrime - Cybercrime is any criminal activity that involves a computer, networked device or a network.
  • cyberextortion - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  • cyberextortionist - Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
  • cyberforensics - Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law.
  • cyberheist - A cyberheist is the online version of the classic bank heist, in which a criminal or criminals hold up or break into a bank to get away with a large sum of money quickly.
  • cybernetics - Cybernetics is a word coined by group of scientists led by Norbert Wiener and made popular by Wiener's book of 1948, Cybernetics or Control and Communication in the Animal and the Machine.
  • Cyberoam - Cyberoam is a vendor for information security products and services.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • cyberpunk - Cyberpunk is a sensibility or belief that a few outsiders, armed with their own individuality and technological capability, can fend off the tendencies of traditional institutions to use technology to control society.
  • cybersecurity - Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close